Agent Survival Guide Podcast

Cybersecurity Best Practices for Insurance Agents


Listen Later

 

Cybersecurity threats are on the rise. It's vital to not only keep your data protected, but as an insurance agent you have the responsibility to protect your clients' data. Find out best practices for internet safety by listening to this episode.

Read the text version

Email us at [email protected]

 

Follow Us on Social!

Ritter on Facebook, https://www.facebook.com/RitterIM Instagram, https://www.instagram.com/ritter.insurance.marketing/ LinkedIn, https://www.linkedin.com/company/ritter-insurance-marketing TikTok, https://www.tiktok.com/@ritterim Twitter, https://twitter.com/RitterIM and Youtube, https://www.youtube.com/user/RitterInsurance

Sarah on LinkedIn, https://www.linkedin.com/in/sjrueppel/ and Instagram, https://www.instagram.com/thesarahjrueppel/

Tina on LinkedIn, https://www.linkedin.com/in/tina-lamoreux-6384b7199/

 

Resources:

5 Basic Care Tips for Your Electronic Devices: https://agentsurvivalguide.podbean.com/e/5-basic-care-tips-for-your-electronic-devices/

Agent Apps | Protect Your Privacy - Password Manager Apps: https://agentsurvivalguide.podbean.com/e/agent-apps-protect-your-privacy-password-manager-apps/

How to Successfully Set SMART Goals: https://agentsurvivalguide.podbean.com/e/how-to-successfully-set-smart-goals-1639071365/

What Are Insurance Agents Responsible for Under HIPAA: https://agentsurvivalguide.podbean.com/e/what-are-insurance-agents-responsible-for-under-hipaa-1637595382/

Why We Added Multi-Factor Authentication to Ritter Logins:  https://www.ritterim.com/blog/why-we-added-multi-factor-authentication-to-ritter-logins/

 

References:

10 Things to Do if Your Identity Is Stolen: https://money.usnews.com/money/personal-finance/family-finance/articles/things-to-do-after-your-identity-is-stolen

Anti Malware Software Program – What is it? https://www.digitaldefense.com/blog/anti-malware-software-program-what-is-it-digital-defense/

Best Identity Theft Protection Services of 2023: https://www.usnews.com/360-reviews/privacy/identity-theft-protection

Confronting Heightened Cybersecurity Threats Amid COVID-19: https://www.cisa.gov/resources-tools/resources/confronting-heightened-cybersecurity-threats-amid-covid-19

Definition of antimalware: https://www.techtarget.com/searchsecurity/definition/antimalware

“End-of-Life”/ “EOL”, “Unsupported”, and “Out of Support” – What Does it All Mean? https://thecomputercellar.com/unsupported/

HHS Strengthens HIPAA Enforcement: https://wayback.archive-it.org/3926/20131018161347/http:/www.hhs.gov/news/press/2009pres/10/20091030a.html

How long does it take to correct identity theft? https://www.allstateidentityprotection.com/content-hub/how-long-does-it-take-to-correct-identity-theft

Multi-Factor Authentication: https://www.cisa.gov/sites/default/files/publications/MFA-Fact-Sheet-Jan22

The HIPAA Privacy Rule: https://www.hhs.gov/hipaa/for-professionals/privacy/index.html

The HIPAA Security Rule: https://www.hhs.gov/hipaa/for-professionals/security/index.html

Omnibus HIPAA Rulemaking: https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/combined-regulation-text/omnibus-hipaa-rulemaking/index.html

Senior scam statistics 2023: https://www.comparitech.com/identity-theft-protection/senior-scam-statistics/

Tip Sheet - Protected Health Information and Personal Identifying Information: https://ora.research.ucla.edu/OHRPP/Documents/Policy/6/PHI_PII.pdf

What hackers actually do with your stolen medical records: https://www.advisory.com/daily-briefing/2019/03/01/hackers

What is a phishing attack: https://www.imperva.com/learn/application-security/phishing-attack-scam/

What is Malware? The Ultimate Guide to Malware: https://www.avg.com/en/signal/what-is-malware

What is the Deep and Dark Web? https://www.kaspersky.com/resource-center/threats/deep-web

What is a VPN? How It Works, Types of VPN: https://www.kaspersky.com/resource-center/definitions/what-is-a-vpn

Why is PHI Valuable to Criminals? https://compliancy-group.com/why-is-phi-valuable-to-criminals/

Why is PHI Valuable to Hackers? https://www.accountablehq.com/post/why-is-phi-valuable-to-hackers

...more
View all episodesView all episodes
Download on the App Store

Agent Survival Guide PodcastBy Sarah J. Rueppel | Ritter Insurance Marketing

  • 4.6
  • 4.6
  • 4.6
  • 4.6
  • 4.6

4.6

41 ratings


More shows like Agent Survival Guide Podcast

View all
BiggerPockets Real Estate Podcast by BiggerPockets

BiggerPockets Real Estate Podcast

16,774 Listeners

Daily Radio Program with Charles Stanley - In Touch Ministries by Dr. Charles Stanley

Daily Radio Program with Charles Stanley - In Touch Ministries

8,832 Listeners

Joyce Meyer Enjoying Everyday Life® TV Audio Podcast by Joyce Meyer

Joyce Meyer Enjoying Everyday Life® TV Audio Podcast

5,321 Listeners

It's a Good Life by Brian Buffini

It's a Good Life

2,536 Listeners

The Rachel Hollis Podcast by Three Percent Chance

The Rachel Hollis Podcast

16,672 Listeners

What the Health? From KFF Health News by KFF Health News

What the Health? From KFF Health News

500 Listeners

The Charlie Kirk Show by Charlie Kirk

The Charlie Kirk Show

69,038 Listeners

The Everything Medicare Podcast! by Christian Brindle

The Everything Medicare Podcast!

107 Listeners

All-In with Chamath, Jason, Sacks & Friedberg by All-In Podcast, LLC

All-In with Chamath, Jason, Sacks & Friedberg

9,909 Listeners

Medicare Marketing & Sales Podcast by Mike Gattorna

Medicare Marketing & Sales Podcast

10 Listeners

The Seven Figures Or Bust Podcast! by Christian Brindle

The Seven Figures Or Bust Podcast!

38 Listeners

Insurance Business Babes by Kathe Kline

Insurance Business Babes

38 Listeners

The Broker Link by The Brokerage Inc.

The Broker Link

11 Listeners

Agent Boost Marketing Podcast by Dan and Mike Hardle

Agent Boost Marketing Podcast

10 Listeners

Medicare Sales Playbook by Medicare Sales Playbook

Medicare Sales Playbook

4 Listeners